From Block list checker: http://www.spamhaus.org/lookup/
CBL Lookup Utility
Automated/scripted bulk lookups are forbidden. Upon detection, automated scripts will be denied access, and the source IP may be listed in the CBL.IP Address xxx.xxx.xxx.xxx is listed in the CBL. It appears to be infected with a spam sending trojan, proxy or some other form of botnet.
It was last detected at 2014-04-04 17:00 GMT (+/- 30 minutes), approximately 4 days, 14 hours, 30 minutes ago.
It has been relisted following a previous removal at 2014-04-03 03:42 GMT (6 days, 3 hours, 20 minutes ago)
This IP is infected (or NATting for a computer that is infected) with the Conficker botnet.
Solution: Using nmap to scan problem computer
Example Usage
# Run the scripts against host(s) that appear to be Windows nmap --script p2p-conficker,smb-os-discovery,smb-check-vulns --script-args=safe=1 -T4 -vv -p445 <host> sudo nmap -sU -sS --script p2p-conficker,smb-os-discovery,smb-check-vulns --script-args=safe=1 -vv -T4 -p U:137,T:139 <host> # Run the scripts against all active hosts (recommended) nmap -p139,445 -vv --script p2p-conficker,smb-os-discovery,smb-check-vulns --script-args=checkconficker=1,safe=1 -T4 <host> # Run scripts against all 65535 ports (slow) nmap --script p2p-conficker,smb-os-discovery,smb-check-vulns -p- --script-args=checkall=1,safe=1 -vv -T4 <host> # Base checks on a different ip address (NATed) nmap --script p2p-conficker,smb-os-discovery -p445 --script-args=realip=\"192.168.1.65\" -vv -T4 <host>
Script Output
Clean machine (results printed only if extra verbosity ("-vv")is specified): Host script results: | p2p-conficker: Checking for Conficker.C or higher... | | Check 1 (port 44329/tcp): CLEAN (Couldn't connect) | | Check 2 (port 33824/tcp): CLEAN (Couldn't connect) | | Check 3 (port 31380/udp): CLEAN (Failed to receive data) | | Check 4 (port 52600/udp): CLEAN (Failed to receive data) |_ |_ 0/4 checks: Host is CLEAN or ports are blocked Infected machine (results always printed): Host script results: | p2p-conficker: Checking for Conficker.C or higher... | | Check 1 (port 18707/tcp): INFECTED (Received valid data) | | Check 2 (port 65273/tcp): INFECTED (Received valid data) | | Check 3 (port 11722/udp): INFECTED (Received valid data) | | Check 4 (port 12690/udp): INFECTED (Received valid data) |_ |_ 4/4 checks: Host is likely INFECTED
Source info from http://nmap.org/nsedoc/scripts/p2p-conficker.html
沒有留言:
張貼留言